SUSE-RU-2021:2770-1: moderate: Recommended update for openCryptoki

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed Aug 18 01:16:46 UTC 2021


   SUSE Recommended Update: Recommended update for openCryptoki
______________________________________________________________________________

Announcement ID:    SUSE-RU-2021:2770-1
Rating:             moderate
References:         #1179319 #1182120 #1182190 #1182726 #1185976 
                    #1188879 ECO-2377 SLE-14723 
Affected Products:
                    SUSE Linux Enterprise Module for Server Applications 15-SP2
______________________________________________________________________________

   An update that has 6 recommended fixes and contains two
   features can now be installed.

Description:

   This update for openCryptoki fixes the following issues:

   - Fixed a bug where the pkcscca migration fails with usr/sb2 is not a
     valid slot ID (bsc#1182120)
   - Fixed a segmentation fault of the sess_opstate test on the Soft Token
     (bsc#1182190)
   - Fixed a segmentation fault of the p11sak list-key (bsc#1182726)
   - Fixed an issue when soft token does not check if an EC key is valid.
     (bsc#1185976)
   - Fixed an issue when the rendered config file incompatible and
     opencryptoki slot daemon is not able to start up again after migration.
     (bsc#1188879)

   Upgraded from version 3.12.1 to 3.15.1 (jsc#SLE-14723)

   - Conform to PKCS 11 3.0 Baseline Provider profile
   - Introduce new vendor defined interface named "Vendor IBM"
   - Support C_IBM_ReencryptSingle via "Vendor IBM" interface
   - CCA: support key wrapping
   - SOFT: support ECC
   - p11sak tool: add remove-key command
   - EP11: Dilitium support stage 2
   - Common: Rework on process, thread, btree and object locking
   - TPM, ICA, ICSF: support multiple token instances
   - new tool p11sak
   - EP11: Dilithium support
   - EP11: EdDSA support
   - EP11: support RSA-OAEP with non-SHA1 hash and MGF
   - Fix compiling with C++ (bsc#1179319)
   - Added error message handling for p11sak remove-key command. (bsc#1179319)


Patch Instructions:

   To install this SUSE Recommended Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-2770=1



Package List:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64 ppc64le s390x x86_64):

      openCryptoki-3.15.1-4.9.1
      openCryptoki-debuginfo-3.15.1-4.9.1
      openCryptoki-debugsource-3.15.1-4.9.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (ppc64le s390x x86_64):

      openCryptoki-devel-3.15.1-4.9.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (ppc64le s390x):

      openCryptoki-64bit-3.15.1-4.9.1
      openCryptoki-64bit-debuginfo-3.15.1-4.9.1


References:

   https://bugzilla.suse.com/1179319
   https://bugzilla.suse.com/1182120
   https://bugzilla.suse.com/1182190
   https://bugzilla.suse.com/1182726
   https://bugzilla.suse.com/1185976
   https://bugzilla.suse.com/1188879



More information about the sle-updates mailing list